On Wed, Aug 2, 2023 at 6:14 PM Konstantin Belousov <kostik...@gmail.com> wrote: > > On Tue, Aug 01, 2023 at 04:33:16PM -0700, Rick Macklem wrote: > > On Mon, Jul 31, 2023 at 11:33 PM David Chisnall <thera...@freebsd.org> > > wrote: > > > > > > Hi, > > > > > > This bit of the C spec is a bit of a mess. There was, I believe, a desire > > > to return volatile to its original use and make any use of volatile other > > > than MMIO discouraged. This broke too much legacy code and so now it’s a > > > confusing state. > > > > > > The requirements for volatile are that the compiler must not elide loads > > > or stores and may not narrow them (I am not sure if it’s allowed to widen > > > them). Loads and stores to a volatile variable may not be reordered with > > > respect to other loads or stores to the same object but *may* be > > > reordered with respect to any other accesses. > > > > > > The sig_atomic_t typedef just indicates an integer type that can be > > > loaded and stored with a single instruction and so is immune to tearing > > > if updated from a signal handler. There is no requirement to use this > > > from signal handlers in preference to int on FreeBSD (whether other types > > > work is implementation defined and int works on all supported > > > architectures for us). > > > > > > The weak ordering guarantees for volatile mean that any code using > > > volatile for detecting whether a signal has fired is probably wrong if if > > > does not include a call to automic_signal_fence(). This guarantees that > > > the compiler will not reorder the load of the volatile with respect to > > > other accesses. In practice, compilers tend to be fairly conservative > > > about reordering volatile accesses and so it probably won’t break until > > > you upgrade your compiler in a few years time. > > > > > > My general recommendation is to use _Atomic(int) (or ideally a enum type) > > > for this. If you just use it like a normal int, you will get sequentially > > > consistent atomics. On a weakly ordered platform like Arm this will > > > include some more atomic barrier instructions but it will do the right > > > thing if you add additional threads monitoring the same variable later. > > > In something like mountd, the extra performance overhead from the > > > barriers is unlikely to be measurable, if it is then you can weaken the > > > atomicity (sequentially consistent unless specified otherwise is a good > > > default in C/C++, for once prioritising correctness over performance). > > > > Just trying to understand what you are suggesting... > > 1 - Declare the variable _Atomic(int) OR atomic_int (is there a preference) > > and > > not volatile. > Really does not matter. > > > 2 - Is there a need for signal_atomic_fence(memory_order_acquire); before > > the > > assignment of the variable in the signal handler. (This exists in > > one place in > > the source tree (bin/dd/misc,c), although for this example, > > neither volatile nor > > _Atomic() are used for the variable's declaration. > In mountd, there are two signal handlers. One for SIGHUP, and another for > SIGTERM. They are very different, let me explain. > > For SIGHUP, the only action in the signal handler is the assignment to > the variable. The assignment itself is atomic on FreeBSD. But what is more > important, there is no ordering issues between this assignment and any other > action. Eventually the main execution context notices that the variable is > set and does something (re-read config). As consequence, there is no need > in any fencing of the SIGHUP handler.
The only concern would be that the setting of "got_sighup" would get lost due to some compiler optimization and it sounds like _Atomic(int) is sufficient to guarantee that will not happen. rick > > > 3 - Is there any need for other atomic_XXX() calls where the variable is > > used > > outside of the signal handler? > > The SIGTERM is different, it does some rpc bind calls to unregister itself > as a mount program. If these actions can interfere with the main context > execution (I believe they are), then userspace rpc bind client state can > be corrupted, resulting in failing attempt to unregister. > > No amount of atomics or fencing would fix it, the unregister action should > be either moved out of the signal handler context to main context. Another > option might be to block SIGTERM, and only unblock it in places where it > is safe to do rpcb calls from interrupt. This is approximately what dd(1) > does. Yes, I think moving the termination into the main context should work. I'll do that as a separate commit/review. I suspect that failing to de-register doesn't cause too much of a problem. since the client won't be able to connect to the port# after mountd has terminated and will fail (just maybe not a gracefully). Same would happen if mountd crashes for some reason (and not terminated via SIGTERM). rick > > > > > In general, it is looking like FreeBSD needs to have a standard way of > > dealing > > with this and there will be assorted places that need to be fixed? > > > > Thanks, rick > > > > > > David > > > > > > > On 1 Aug 2023, at 06:14, Rick Macklem <rick.mack...@gmail.com> wrote: > > > > > > > > Hi, > > > > > > > > I just put D41265 up on phabricator. It is a trivial > > > > change to mountd.c that defines the variable set > > > > by got_sighup() (the SIGHUP handler) as > > > > static volatile sig_atomic_t > > > > instead of > > > > static int > > > > > > > > I did list a couple of reviewers, but if you are familiar > > > > with this C requirement, please take a look at it and > > > > review it. > > > > > > > > Thanks, rick > > > > ps: I was unaware of this C requirement until Peter Eriksson > > > > reported it to me yesterday. Several of the other NFS > > > > related daemons probably need to same fix, which I will > > > > do after this is reviewed. > > > > > > >